IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Web Access Control

RSS Feed    Add to Google    Add to My Yahoo!
Web Access ControlReports
 
Enabling a secure and convenient online banking experience
sponsored by HID
WHITE PAPER: In this white paper, discover security solutions that are scalable, secure and simple to implement for online banking.
Posted: 09 Jul 2014 | Published: 03 May 2013

HID

Best Practices for Deploying Cloud
sponsored by Scalr
EGUIDE: This expert e-guide reveals why cloud industry expert David Linthicum believes clouds are more secure than traditional IT systems, as well as hybrid clouds taking over in the future.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

Scalr

MarketScope for Web Access Management
sponsored by CA Technologies.
WHITE PAPER: This resource provides an insight to the market segmentation for WAM, as well as analysis of thirteen vendors in the market
Posted: 23 Jun 2014 | Published: 15 Nov 2013

CA Technologies.

HIPAA/HITECH Compliance Using VMware vCloud Hybrid Service
sponsored by CDW Corporation
WHITE PAPER: Uncover the responsibilities for PHI in the cloud, as well as an introduction to the VMware Business Associate Agreement.
Posted: 15 Sep 2014 | Published: 31 Dec 2013

CDW Corporation

One Time Passwords for Mobile Authentication
sponsored by HID
WHITE PAPER: In this white paper, explore how more financial institutions are adopting mobile authentication for on line banking and deploying mobile platforms.
Posted: 24 Jul 2014 | Published: 07 Apr 2014

HID

Best Practices for Secure Mobile Access
sponsored by Dell Software
WHITE PAPER: Learn how you can implement secure mobile access in a controlled, step-by-step manner, so you can allow your increasingly mobile workforce to become more productive and still ensure the security of your corporate data and resources.
Posted: 04 Aug 2014 | Published: 31 Dec 2013

Dell Software

Continuous Application Availability With EMC VPLEX
sponsored by Bull
WHITE PAPER: This whitepaper discusses the effectiveness of "continuous availability" programs as compared to traditional DR and HA, and takes a look at the EMC deployment model for continuous application availability.
Posted: 09 Oct 2014 | Published: 09 Oct 2014

Bull

10 Things Every IT Manager Must Know About the Enemy Within
sponsored by Clearswift
WHITE PAPER: This white paper contains critical information on where insider threats originate and explores one company's innovative tools for preventing data breaches within your enterprise.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Clearswift

A More Effective Approach to Scalable Data Classification
sponsored by Digital Guardian
WHITE PAPER: This white paper highlights the importance of using a scalable data classification program within your organization.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement